As a security architect or administrator of an enterprise computing environment, the moment you heard of the openssl heartbleed vulnerability, you probably pondered what the required steps were to recover from the situation. This might have resulted in a checklist: a....